CVE-2022-20716
Published on: Not Yet Published
Last Modified on: 05/13/2022 05:50:00 PM UTC
CVE-2022-20716 - advisory for cisco-sa-sd-wan-file-access-VW36d28P
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Sd-wan from Cisco contain the following vulnerability:
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.
- CVE-2022-20716 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco SD-WAN Solution version n/a
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 7.2 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | tools.cisco.com text/html |
![]() |
Related QID Numbers
- 317148 Cisco SD-WAN Solution Improper Access Control Vulnerability (cisco-sa-sd-wan-file-access-VW36d28P)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Sd-wan | All | All | All | All |
Application | Cisco | Sd-wan Solution | - | All | All | All |
Application | Cisco | Sd-wan Vbond Orchestrator | - | All | All | All |
Application | Cisco | Sd-wan Vedge Cloud | - | All | All | All |
Application | Cisco | Sd-wan Vedge Router | - | All | All | All |
Application | Cisco | Sd-wan Vmanage | - | All | All | All |
Application | Cisco | Sd-wan Vsmart Controller Software | - | All | All | All |
- cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_solution:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_vedge_cloud:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_vedge_router:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_vmanage:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_vsmart_controller_software:-:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-20716 : A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker… twitter.com/i/web/status/1… | 2022-04-15 14:33:52 |
![]() |
CVE-2022-20716 | 2022-04-15 15:38:25 |